BEGIN:VCALENDAR
VERSION:2.0
METHOD:PUBLISH
PRODID:-//Missouri State University/Calendar of Events//EN
CALSCALE:GREGORIAN
X-WR-TIMEZONE:America/Chicago
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
DTSTART:20070311T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
DTSTART:20071104T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:d40bddbc-4f8e-4846-a97b-059a12f6e13c.185330@calendar.missouristate.edu
CREATED:20180202T170210Z
LAST-MODIFIED:20180202T170210Z
LOCATION:Plaster Free Enterprise Center\, Robert W. PCTR 1001
SUMMARY:Cybersecurity: Protecting Your Business from Fraud        
DESCRIPTION:Is your business safe from a cyber-attack? Small business owne
 rs will learn what actions they can take to take to lessen the risk of th
 eir business being hacked or compromised by a cybersecurity incident. In 
 the past four years\, cyber-attacks on small businesses have increased 66
 0 percent. According to the National Small Business Association\, the ave
 rage attack on a small business costs that business $7\,115.  Companies t
 hat had their bank accounts hacked lost an average of $32\,020.\n\n\nThe 
 goal of this seminar is to protect your organization's confidential data 
 from cyber and internal criminals. This session focuses on a widespread f
 orm of targeted fraud impacting small- to medium-sized businesses\, non-p
 rofits\, schools and public sector entities utilizing today’s technology.
  Perpetrators of the crime attempt to transfer money out of bank accounts
  using wire transfers and ACH transactions\, as well as other internal fr
 aud schemes.  \n\n\nFBI-recommended risk mitigation techniques will be pr
 esented. Learn inexpensive and zero cost measures to protect your busines
 s today.\n\n\n\nHear from a panel of experts in the fields of accounting\
 , information technology\, banking\, insurance and computer recycling\nLe
 arn the steps to safeguard your business\nLearn how to access resources a
 nd connect to professionals\n\nThe presentation will cover:\n\n\n1. Intro
 duction: internal/external risk\n\n\n2. Description: how the fraud works\
 , victim selection\, perpetration methods\n\n\n3. Protection: education\;
  computer\, network and process enhancements\; responsibilities and liabi
 lities\n\n\n4. Detection: account monitoring\, warning signs\, anti-virus
  software\n\n\n5. Response: compromised computer handling and reporting s
 uspicious activity\n\n\n6.  Destruction: how to safely destroy hardware a
 nd responsible disposal
X-ALT-DESC;FMTTYPE=text/html:&lt;html&gt;&lt;head&gt;&lt;title&gt;&lt;/title&gt;&lt;/head&gt;&lt;body&gt;&lt;p&gt;Is
  your business safe from a cyber-attack? Small business owners will learn
  what actions they can take to take to lessen the risk of their business 
 being hacked or compromised by a cybersecurity incident. In the past four
  years\, cyber-attacks on small businesses have increased 660 percent. Ac
 cording to the National Small Business Association\, the average attack o
 n a small business costs that business $7\,115.&amp;nbsp\; Companies that had
  their bank accounts hacked lost an average of $32\,020.&lt;/p&gt;\n&lt;p&gt;The goal
  of this seminar is to protect your organization's confidential data from
  cyber and internal criminals. This session focuses on a widespread form 
 of targeted fraud impacting small- to medium-sized businesses\, non-profi
 ts\, schools and public sector entities utilizing today’s technology. Per
 petrators of the crime attempt to transfer money out of bank accounts usi
 ng wire transfers and ACH transactions\, as well as other internal fraud 
 schemes.&amp;nbsp\;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;FBI-recommended risk mitigation techniques
  will be presented. Learn inexpensive and zero cost measures to protect y
 our business today.&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;Hear from a panel of experts in the fi
 elds of accounting\, information technology\, banking\, insurance and com
 puter recycling&lt;/li&gt;\n&lt;li&gt;Learn the steps to safeguard your business&lt;/li&gt;
 \n&lt;li&gt;Learn how to access resources and connect to professionals&lt;/li&gt;\n&lt;/
 ul&gt;\n&lt;p&gt;The presentation will cover:&lt;/p&gt;\n&lt;p&gt;1. Introduction: internal/ex
 ternal risk&lt;/p&gt;\n&lt;p&gt;2. Description: how the fraud works\, victim selectio
 n\, perpetration methods&lt;/p&gt;\n&lt;p&gt;3. Protection: education\; computer\, ne
 twork&amp;nbsp\;and process enhancements\; responsibilities and liabilities&lt;/
 p&gt;\n&lt;p&gt;4. Detection: account monitoring\, warning signs\, anti-virus soft
 ware&lt;/p&gt;\n&lt;p&gt;5. Response: compromised computer handling and reporting sus
 picious activity&lt;/p&gt;\n&lt;p&gt;6.&amp;nbsp\; Destruction: how to safely destroy har
 dware and responsible disposal&lt;/p&gt;&lt;/body&gt;&lt;/html&gt;
DTSTART;TZID=America/Chicago:20180228T110000
DTEND;TZID=America/Chicago:20180228T140000
SEQUENCE:0
URL:http://cbed.missouristate.edu/wconnect/CourseStatus.awp3?~~SP0900218
CATEGORIES:Public,Alumni,Current Students,Faculty,Staff
END:VEVENT
END:VCALENDAR